Sciweavers

3516 search results - page 212 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
172
Voted
RE
2010
Springer
14 years 10 months ago
Integrating Preferences into Goal Models for Requirements Engineering
Requirements can differ in their importance. As such the priorities that stakeholders associate with requirements may vary from stakeholder to stakeholder and from one situation to...
Sotirios Liaskos, Sheila A. McIlraith, Shirin Sohr...
ICRA
2008
IEEE
145views Robotics» more  ICRA 2008»
15 years 10 months ago
Who am I talking with? A face memory for social robots
— In order to provide personalized services and to develop human-like interaction capabilities robots need to recognize their human partner. Face recognition has been studied in ...
Marc Hanheide, Sebastian Wrede, Christian Lang, Ge...
108
Voted
ICAIL
2007
ACM
15 years 7 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
154
Voted
KBSE
2005
IEEE
15 years 9 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
152
Voted
CCE
2008
15 years 3 months ago
Global optimization of multiscenario mixed integer nonlinear programming models arising in the synthesis of integrated water net
The problem of optimal synthesis of an integrated water system is addressed in this work, where water using processes and water treatment operations are combined into a single net...
Ramkumar Karuppiah, Ignacio E. Grossmann